default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2009
- Elisa Bertino, James B. D. Joshi:
Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 10, Springer / ICST 2009, ISBN 978-3-642-03353-7 [contents] - 2008
- Yacine Atif, Mohamed Adel Serhani, Piers Campbell, Sujith Samuel Mathew:
Trusted Translation Services. CollaborateCom 2008: 778-791 - Claudio Bartolini:
IT Incident Management as a Collaborative Process: A Visualization Tool Inspired to Social Networks. CollaborateCom 2008: 824-830 - Steffen Bartsch, Karsten Sohr, Carsten Bormann:
Supporting Agile Development of Authorization Rules for SME Applications. CollaborateCom 2008: 461-471 - Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, Kevin J. Steuer:
A Federated Digital Identity Management Approach for Business Processes. CollaborateCom 2008: 194-206 - Matthias R. Brust, Carlos H. C. Ribeiro, Jaruwan Mesit:
Avoiding Greediness in Cooperative Peer-to-Peer Networks. CollaborateCom 2008: 370-378 - Jack L. Burbank, William T. Kasch:
The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks. CollaborateCom 2008: 472-484 - Thorben Burghardt, Erik Buchmann, Klemens Böhm, Chris Clifton:
Collaborative Search and User Privacy: How Can They Be Reconciled?. CollaborateCom 2008: 85-99 - Guoray Cai, Anna Cinzia Squicciarini:
A Unified Theory of Trust and Collaboration. CollaborateCom 2008: 425-438 - Barbara Carminati, Elena Ferrari, Andrea Perego:
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access. CollaborateCom 2008: 126-144 - Tiziana Catarci, Febo Cincotti, Massimiliano de Leoni, Massimo Mecella, Giuseppe Santucci:
Smart Homes for All: Collaborating Services in a for-All Architecture for Domotics. CollaborateCom 2008: 56-69 - William R. Claycomb, Dongwan Shin:
Protecting Sensitive Information in Directory Services Using Virtual Directories. CollaborateCom 2008: 244-257 - Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko Orsini:
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments. CollaborateCom 2008: 322-339 - Viplavi Donepudi, Mohamed F. Younis:
Employing Sink Mobility to Extend the Lifetime of Wireless Sensor Networks. CollaborateCom 2008: 355-369 - Renato J. O. Figueiredo, P. Oscar Boykin, José A. B. Fortes, Tao Li, Jie-Kwon Peir, David Wolinsky, Lizy K. John, David R. Kaeli, David J. Lilja, Sally A. McKee, Gokhan Memik, Alain Roy, Gary S. Tyson:
Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education. CollaborateCom 2008: 70-84 - Yasser Ganjisaffar, Sara Javanmardi, Stanley Grant, Cristina Videira Lopes:
CalSWIM: A Wiki-Based Data Sharing Platform. CollaborateCom 2008: 34-43 - Peter Géczy, Noriaki Izumi, Shotaro Akaho, Kôiti Hasida:
Analytics and Management of Collaborative Intranets. CollaborateCom 2008: 623-631 - Hoda Hassan, Ramy Eltarras, Mohamed Eltoweissy:
Towards a Framework for Evolvable Network Design. CollaborateCom 2008: 390-401 - Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. Miller, Khaled Rasheed, E. Rodney Canfield:
Replication in Overlay Networks: A Multi-objective Optimization Approach. CollaborateCom 2008: 512-528 - Matthias Hauswirth:
Informa: An Extensible Framework for Group Response Systems. CollaborateCom 2008: 271-286 - Kori Inkpen, Steve Whittaker, Mary Czerwinski, Roland Fernandez, James R. Wallace:
GroupBanter: Supporting Serendipitous Group Conversations with IM. CollaborateCom 2008: 485-498 - Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xinwen Zhang:
Access Control Model for Sharing Composite Electronic Health Records. CollaborateCom 2008: 340-354 - Youna Jung, Amirreza Masoumzadeh, James B. D. Joshi, Minkoo Kim:
RiBAC: Role Interaction Based Access Control Model for Community Computing. CollaborateCom 2008: 304-321 - Sasa Junuzovic, Prasun Dewan:
Serial vs. Concurrent Scheduling of Transmission and Processing Tasks in Collaborative Systems. CollaborateCom 2008: 746-759 - Minsoo Kim, James B. D. Joshi, Minkoo Kim:
Access Control for Cooperation Systems Based on Group Situation. CollaborateCom 2008: 11-23 - Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:
Incentive and Trust Issues in Assured Information Sharing. CollaborateCom 2008: 113-125 - Cam Tu Phan Le, Frédéric Cuppens, Nora Cuppens-Boulahia, Patrick Maillé:
Evaluating the Trustworthiness of Contributors in a Collaborative Environment. CollaborateCom 2008: 451-460 - Alison Lee, Umesh Chandra:
Enabling Meetings for "Anywhere and Anytime". CollaborateCom 2008: 792-804 - Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squicciarini, Dongwon Lee, Chao-Hsien Chu:
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. CollaborateCom 2008: 100-112 - Wenjia Li, James Parker, Anupam Joshi:
Security through Collaboration in MANETs. CollaborateCom 2008: 696-714
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 19:58 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint